Abstract is missing.
- On the security of authenticated key agreement schemes for e-healthcareAbhijit Kasi, Mohammad S. Obaidat, Purva Rewal, Dheerendra Mishra, Kuei-Fang Hsiao. 1-6 [doi]
- Scheduling Tightly Coupled Parallel Jobs With Runtime-Extended Tasks on Distributed ResourcesGeorgios L. Stavrinides, Helen D. Karatza. 1-7 [doi]
- Secure Transmission in Cell-Free Massive MIMO Network with Phase NoiseXianyu Zhang, Tao Liang 0001, Kang An 0001, Xiaoqiang Qiao, Xiaoyu Wang 0005. 1-6 [doi]
- Internet-of-Explainable-Digital-Twins: A Case Study of Versatile Corn Production EcosystemPronaya Bhattacharya, Mohammad S. Obaidat, Sakshi Sanghavi, Vatsal Sakariya, Sudeep Tanwar, Kuei-Fang Hsiao. 1-5 [doi]
- Examining the influence of national digital identity and smart pass platform on accelerating the processes of digital transformationAbdelrahman Ahmed AlHammadi, Mohammed Lataifeh. 1-6 [doi]
- On the Security of Content key Distribution Framework for DRM systemsPurva Rewal, Abhijit Kasi, Mohammad S. Obaidat, Dheerendra Mishra, Ankita Mishra, Kuei-Fang Hsiao. 1-7 [doi]
- GaitPretreatment: Robust Pretreatment Strategy for Gait RecognitionYuanyuan Han, Zhong Wang, Xin Han, Xiaoya Fan. 1-6 [doi]
- A Novel Objective Video Quality Assessment Metric For Cloud Gaming ApplicationsNafi Ahmad, Abdul Wahab, John A. Schormans, Ali Adib Arnab. 1-8 [doi]
- Research on CNN-SVM method for gastroscopic image detectionWenjieline Chen, Pinghui Wu, Weichao Xu, Kewen Xia. 1-6 [doi]
- An Efficient Digital Short Signature Scheme using CCM for HC-IoT EnvironmentsChandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali, Akshaykumar Meshram, Kuei-Fang Hsiao. 1-6 [doi]
- Medium and Short-Term Prediction of Power System Load Based on Improved LSTM AlgorithmShuo Yang, Jiahao Yang, Xianshi Ge, Xiaoting Wang. 1-7 [doi]
- Exploring the relationship between IT competence and digital transformation within government projects in the UAEAbdelrahim Alzarooni, Mohammed Lataifeh. 1-5 [doi]
- A Rotation Speed Measurement System based on Millimeter WaveZijun Song, Qiwei Wang. 1-8 [doi]
- Transfer Learning Approach to Discover IDS Configurations Using Deep Neural NetworksAbdulmonem Alshahrani, John A. Clark. 1-8 [doi]
- An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMISChandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali, Parkash Tambare, Kuei-Fang Hsiao. 1-6 [doi]
- Fraud Detection During Financial Transactions Using Machine Learning and Deep Learning TechniquesMahbuba Yesmin Turaba, Mehedi Hasan, Nazrul Islam Khan, Hafiz Abdur Rahman. 1-8 [doi]
- A Quality of Service Aware VM Placement for User Applications in Cloud Data CenterArash Hadadi, Alireza Shameli Sendi. 1-6 [doi]
- BeHAutH: A KNN-Based Classification Scheme for Behavior-Based Authentication in Web 3.0Pronaya Bhattacharya, Chandan Trivedi, Mohammad S. Obaidat, Kartik Patel, Sudeep Tanwar, Kuei-Fang Hsiao. 1-5 [doi]
- FedADSN: Anomaly detection for social networks under decentralized federated learningYikuan Chen, Li Liang, Wei Gao. 111-117 [doi]